Almost to the familiar reframe, “Well I dunno–do you? If not you–than who?”

These were plastered in multiple locations exactly like this.

It’s funny, we think we are giving people information–the stuff they need.

But when it comes across to the other person, perhaps all we’ve done is left them with more questions than answers.

In an age of information technology, business analytics, big data, and artificial intelligence…we still can’t even seem to figure out the basics of managing information and communications with each other.

Lots of products being heralded as the answer…including IBM’s Watson, but aside from answering Jeopardy questions, the jury is still out on whether this can really evolve to true AI.

If it was just a technology issue, we may already be getting close, but the bigger piece of this puzzle is people really understanding the challenges they confront, and being able identify and work with the information to solve these.

Then maybe we would finally have the answers or at least where it is! 😉

Homeland Security Today Magazine (March 2010) has an interesting article called “Biometrics on the Battlefield” about how the American military has had significant success in Afghanistan taking biometrics and in using it for “vetting, tracking, and identification.”

Here’s how it’s done:

The biometrics system uses HIIDE (Handheld Interagency Identity Detection System) devices, which is “similar in size to a large camera, [that] connects directly to the BATS [Biometrics Automated Tool Set] database and matches inputs against a biometrics watch list of 10,000 individuals.”

The database “BATS uses a combination of fingerprints, photographs and iris scans, in addition to an in-depth background examination” to “screen potential local employees, identify detainees, and differentiate friendly individuals from insurgents and terrorists.”

How successful has the use of biometrics been?

“The use of biometrics has clearly thwarted security breaches and helped prevent unwanted activities by the enemy. Additionally, in 2008 alone, hundreds of HVTs (high value targets) were identified through the use of this biometrics technology.”

The article suggests the application of this biometric system for domestic law enforcement use.

Currently, fingerprint cards or stationary scanners are common, but with the proposed military biometrics system, there is the technology potential to use mobile scanning devices quickly and easily in the field.

The article gives the example: “if an officer came into contact with an individual under suspect conditions, a simple scan of the iris would ascertain that person’s status as a convicted felon, convicted violent felon, convicted sex offender or someone on whom an alert has been placed.”

In this scenario, quicker and more accurate identification of suspects could not only aid in dealing with dangerous offenders and benefit the officers in terms of their personal safety, but also contribute to ensuring community safety and security through enhanced enforcement capabilities.

Of course, using such a system for law enforcement would have to pass legal muster including applicable privacy concerns, but as the author, Godfrey Garner, a retired special forces officer, states “hopefully, this valuable technology will be recognized and properly utilized to protect law enforcement officer in the United States. I know that I’ve seen it protect our sons and daughters on the battlefields of Afghanistan.”

We are living in an amazing time of technology advances, and the potential to save lives and increase public safety and security through lawful use of biometrics is a hopeful advancement for all.

As we move towards a “paperless society” and migrate our data to the computer and the Internet, we can find personal profiles, resumes, photos, videos, emails, documents, presentations, news items, scanned copies of diplomas and awards, contact lists, and even financial, tax, and property records.

People have so much information on the web (and their hard drive) these days that they fear one of two things happening:

Their hard drive will crash and they will lose all their valuable information.

Someone will steal their data and their identity (identity theft)

For each of these, people are taking various precautions to protect themselves such as backing up their data and regularly and carefully checking financial and credit reports.

Despite some risks of putting “too much information” out there, the ease of putting it there, and the convenience of having it there—readily available—is driving us to make the Internet our personal storage device.

One man is taking this to an extreme. According to Wired Magazine (September 2009), Gordon Bell is chronicling his life—warts and all—online. He is documenting his online memory project—MyLifeBits—in a book, called Total Recall.

“Since 2001, Bell has been compulsively scanning, capturing and logging each and every bit of personal data he generates in his daily life. The trove includes Web Sites he’s visited (22,173), photos taken (56,282), docs written and read (18,883), phone conversations had (2,000), photos snapped by SenseCam hanging around his neck (66,000), songs listened to (7,139) and videos taken by (2,164). To collect all this information, he uses a staggering assortment of hardware: desktop scanner, digicam, heart rate monitor, voice recorder, GPS logger, pedometer, Smartphone, e-reader.”

Mr. Bell’s thesis is that “by using e-memory as a surrogate for meat-based memory, we free our minds to engage in more creativity, learning, and innovation.”

Honestly, with all the time that Bell spends capturing and storing his memories, I don’t know how he has any time left over for anything creative or otherwise.

Some may say that Gordon Bell has sort of an obsessive-compulsive disorder (OCD)—you think? Others that he is some sort of genius that is teaching the world to be free and open to remembering—everything!

Personally, I don’t think that I want to remember “everything”. I can dimly remember some embarrassing moments in elementary school and high school that I most sure as heck want to forget. And then there are some nasty people that would be better off buried in the sands of time. Also, some painful times of challenge and loss—that while may be considered growth experiences—are not something that I really want on the tip of my memory or in a file folder on my hard drive or a record in a database.

It’s good to remember. It’s also sometimes good to forget. In my opinion, what we put online should be things that we want or need to remember or access down the road. I for one like to go online every now and then and do some data cleanup (and in fact there are now some programs that will do this automatically). What I thought was worthwhile, meaningful, or important 6 months or a year ago, may not evoke the same feelings today. Sometimes, like with purchases I made way back when, I think to myself, what was I thinking when I did that? And I quickly hit the delete key (wishing I could do the same with those dumb impulse purchases!). Most of the time, I am not sorry that I did delete something old and I am actually happy it is gone. Occasionally, when I delete something by accident, then I start to pull my hair out and run for the backup—hoping that it really worked and the files are still there.

In the end, managing the hard drive takes more work then managing one’s memories, which we have little conscious control over. Between the e-memory and the meat memory, perhaps we can have more of what we need and want to remember and can let go and delete the old and undesired one—and let bygones be bygones.

Anyone following the strategic acquisitions by Oracle the last few years can see a very clear trend: Oracle is amassing a treasure-trove of business applications that are powerful, interoperable, and valuable to mission delivery.

Most recently, Oracle snapped up Sun for $7.38 billion, right from under the clutches of IBM!

Oracle with $22.4 billion in revenue in 2008 and 55% of license revenue generated overseas “is the world’s largest business software company, with more than 320,000 customers—including 100 of the Fortune 100—representing a variety of sizes and industries in more than 145 countries around the globe.”(www.oracle.com)

Oracle’s roots are as a premiere database company. However, since 2004, they made more than 50 acquisitions in calculated business areas.

The Wall Street Journal, 21 April 2009, identifies some of these notable buys:

2004—PeopleSoft for human resources and financial management.

2005—Siebel for customer relationship management.

2007—Hyperion Solutions for business intelligence.

2008—BEA Systems for infrastructure management.

2009—Sun Microsystems for software, servers, and storage devices.

“Oracle has been able to acquire companies with operating-profit margins of 10% and within six months expand those margins to 40%.”

With the recent purchase of Sun, Oracle is gaining control of critical open-source software such as Java programming technology, Solaris operating system, and MySQL database.

According to Forrester Research, “Forty-six percent of businesses plan to deploy open-source software in 2009.” Oracle can now provide an important service in product support and updates for this. (Wall Street Journal, 22 April 2009)

In addition, Oracle also provides various middleware to integrate business applications and automate processes.

From databases to end-user applications, from service-oriented architecture to infrastructure management, from content management to business intelligence, Oracle has put together a broad impressive lineup. Of course, this is NOT an endorsement for Oracle (as other companies may have as good or even better solutions), but rather an acknowledgement of Mr. Ellison’s keen architecture strategy that is building his company competitively and his product offering compellingly. Ellison is transforming the company from a successful single brand that was at risk of becoming commoditized to a multi-faceted brand with synergies among its various lines of business and products.

Some lessons for enterprise architects and CIOs: Build your product lineup, create synergies, uniformly brand it, and be number one or number two in every product category that you’re in (as Jack Welch famously advised) and grow, grow, grow!